This device allows graphic designers to edit images with precision
Graphics Tablet
This device is commonly used to capture video during online classes
Webcam
This device is an essential part of any computer setup, used for typing text and commands.
Keyboard
This device is used to display images or data generated by a computer.
Monitor
This type of malware allows attackers to control a system remotely
Bot
This operating system function involves managing user authentication and access control
Security Management
Reinstalling OS from scratch
Clean Install
This type of OS is best for running multiple applications at the same time.
Multitasking OS
This boot method allows you to install an operating system over the network.
PXE Boot
This is a psychological attack that targets human behavior.
Social Engineering
This attack involves the encryption of files and demands payment to unlock them.
Ransomware
This storage device is known for faster data access and is commonly used in modern computers
SSD
This type of attack involves an attacker stealing sensitive data by impersonating a legitimate source.
Phising
This type of partition style supports a maximum partition size of 2TB.
MBR Partition Style
The process of adding extra security to user logins with something like a code sent to a phone is called what?
The storage device installed inside a computer unit, often referred to as "fixed", is known as what?
Hard Disk
The full form of DNS stands for what in networking?
This is the first step when installing a new operating system on a computer.
Downloading the OS
This type of software controls hardware and allows communication with applications.
System Software
This type of partition style is required for disks larger than 2TB.
GPT
This type of operating system supports real-time operations where the system responds immediately to inputs, often used in critical environments such as aviation and medical systems.
This term refers to an attack where malicious software secretly records user activity, often used to capture sensitive information like passwords and credit card details.
Keylogger
This tool is designed to assist users in designing and creating images or artwork, allowing for detailed editing and manipulation of digital graphics.
Graphics Software- (ex.Adobe Photoshop)
This type of software is responsible for managing the hardware resources of a computer and provides a platform for other applications to run.
System Software
This specialized type of computer, designed to handle and process large-scale computations, is often used for tasks like scientific research, simulations, and complex mathematical modeling
Supercomputer